Types of policies in e-commerce, Computer Engineering

Assignment Help:

1- The Privacy Policy:

The vendor must explain to the customer how all his information especially sensitive ones will be totally private, and no one can read them or use them in any illegal issues.

2- The Security Policy:

The vendor must explain to the customer that the money information will be totally secured, like credit card details, and the customer will be informed when the money for the current operation gets decremented from his balance.

3- The Delivery and Shipping Policy:

The vendor must explain to the customer how and when the purchased products will be delivered, and if there are any charges for the shipment.

4- The Return Policy:

The vendor must explain if the purchased products could be returned or not, and if yes then they could be returned under what conditions, within how many days after the delivery.

5- The Replace or Refund Policy:

The vendor must explain when and how the customer returns the purchased product and the available options he can choose from.

6- Customer Satisfaction Policy:

The vendor must explain to the customer how to guarantee that he will be satisfied with the product or service, and how to measure his satisfaction. Also the vendor must take care of their feedbacks.

7- The Warranty Policy:

The vendor must explain to the customer if the purchased product will be under warranty or not and for how long, and under what conditions.

When a customer decides to purchase a product or to get a service online he should read carefully the policies of the vendor, so he knows how all his rights will be saved, as polices are not standard for all vendors, and not all vendors explain clearly their policies, so the customer must be careful to not be a victim of crooks.


Related Discussions:- Types of policies in e-commerce

Define situation as transmitter & receiver, The situation when both transmi...

The situation when both transmitter and receiver have to work in tandem is referred to as? The situation while both transmitter and receiver have to work into tandem is termed

Explain services of application layer., Explain services of Application Lay...

Explain services of Application Layer. Application Layer: As the highest layer within the OSI reference model, the application layer gives services to the users of OSI env

What is gimp?, The GNU Image Manipulation Program, or GIMP, is a raster gra...

The GNU Image Manipulation Program, or GIMP, is a raster graphics editor application with some support for vector graphics. GIMP is used to process digital graphics & photographs.

Explain the action-object matrix, Explain the Action-object matrix A...

Explain the Action-object matrix A matrix showing how update actions influence objects.  It may be considered to be part of user object model as it summarizes user object ac

Explain fixed arithmetic pipelines, Fixed Arithmetic pipelines We take ...

Fixed Arithmetic pipelines We take the illustration of multiplication of fixed numbers. Two fixed point numerals are added by ALU (Arithmetic and logic unit) using shift and ad

Write the binary representation of an integer number, The integer n = 3,510...

The integer n = 3,510,593 has hexadecimal representation 0x00359141 (check this with your d2h program), while the double precision, floating-point number 3510593.0 has hexadecimal

What is system software, What is system software? Give an example. It i...

What is system software? Give an example. It is a collection of program that are implemented as needed to perform functions such as I.  Receiving and interpreting user comma

What does formal verification mean, What does formal verification mean? ...

What does formal verification mean? Formal verification uses Mathematical techniques by proving the design by assertions or properties. Correctness of the design can be achiev

Memory organization - computer architecture, Memory Organization - Computer...

Memory Organization - Computer architecture: BASIC CONCEPTS: Address space - 16-bit : 216 = 64K mem. locations - 32-bit : 232 = 4G mem. locations -          40-b

What information is stored in a typical TLB table entry, In a simple paging...

In a simple paging system, what information is stored in a typical Look-aside Buffers  TLB table entry? A classical TLB table entry contains page# and frame#, while a logical

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd